?
Solved

steps to install and configure dotDefender to protect IIS web servers

Posted on 2015-01-18
1
Medium Priority
?
240 Views
Last Modified: 2015-01-20
Hello Experts,

Can someone please provide high level steps to install and configure dotDefender to protects IIS web servers against a variety of vulnerabilities to include:

Path Traversal
Known worms
Remote Command Execution
Probes
Denial of Service attacks
Compromised servers

Any links, blogs, with tons of screenshots that you can share in addition to your thoughts to summarize the installation and configuration of dotDefender?
0
Comment
Question by:Jerry Seinfield
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 82

Accepted Solution

by:
David Johnson, CD, MVP earned 1500 total points
ID: 40556789
Just so you know there is no all in one silver bullet i.e. a DDOS attack doesn't require that you have a web server it just helps to monitor the effects of the DDOS attack. Installation is a simple next, next, next, ok

Personally we use cloudflare which is much higher rated. http://www.cloudflare.com
http://website-security-and-performance-review.toptenreviews.com/incapsula-review.html
0

Featured Post

Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question